Sciweavers

1259 search results - page 243 / 252
» Information Management and Process Improvement Using Data Mi...
Sort
View
CCS
2008
ACM
15 years 6 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
EDBT
2010
ACM
206views Database» more  EDBT 2010»
15 years 11 months ago
Efficient computation of trade-off skylines
When selecting alternatives from large amounts of data, trade-offs play a vital role in everyday decision making. In databases this is primarily reflected by the top-k retrieval p...
Christoph Lofi, Ulrich Güntzer, Wolf-Tilo Bal...
ECCE
2011
14 years 4 months ago
Design of a safe computer-supported cooperative environment in radiotherapy: exploratory identification of cooperation strategie
Motivation – This research deals with the identification of collective production of a safe radiotherapy treatment and its potential assistance through computer-supported enviro...
Maria Isabel Munoz, Vanina Mollo, Flore Barcellini...
APSCC
2008
IEEE
15 years 11 months ago
Integration and Implementation of Secured IP Based Surveillance Networks
— This paper presents a method of integration and implementation of transmitting video and audio data from multiple Internet Protocol (IP) surveillance cameras in a wireless sens...
Charles C. Castello, Jeffrey Fan, Te-Shun Chou, Ho...
CISS
2008
IEEE
15 years 10 months ago
Rate adaptation via link-layer feedback for goodput maximization over a time-varying channel
Abstract—We consider adapting the transmission rate to maximize the goodput, i.e., the amount of data transmitted without error, over a continuous Markov flat-fading wireless ch...
Rohit Aggarwal, Phil Schniter, Can Emre Koksal